File _patchinfo of Package patchinfo.32471

<patchinfo incident="32471">
  <issue tracker="bnc" id="1216922">VUL-0: CVE-2023-5678: openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow</issue>
  <issue tracker="bnc" id="1219243">VUL-0: CVE-2024-0727: compat-openssl098,openssl,openssl-1_0_0,openssl-1_1,openssl-1_1-livepatches,openssl-3,openssl1: openssl: denial of service via null dereference</issue>
  <issue tracker="cve" id="2023-5678"/>
  <issue tracker="cve" id="2024-0727"/>
  <packager>ohollmann</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for openssl</summary>
  <description>This update for openssl fixes the following issues:

- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
- CVE-2023-5678: Denial of service via long X9.42 DH keys (bsc#1216922).
</description>
</patchinfo>
openSUSE Build Service is sponsored by